Tech News

Tech Business News

  • Home
  • Technology
  • Business
  • News
    • Technology News
    • Local Tech News
    • World Tech News
    • General News
    • News Stories
  • Media Releases
    • Tech Media Releases
    • General Media Releases
  • Advertisers
    • Advertiser Content
    • Promoted Content
    • Sponsored Whitepapers
    • Advertising Options
  • Cyber
  • Reports
  • People
  • Science
  • Articles
    • Opinion
    • Digital Marketing
    • Gaming
    • Guest Publishers
  • About
    • Tech Business News
    • News Contributions -Submit
    • Journalist Application
    • Contact Us
Reading: Your Backups Might Be Your Greatest Weakness
Share
Font ResizerAa
Tech Business NewsTech Business News
  • Home
  • Technology News
  • Business News
  • News Stories
  • General News
  • World News
  • Media Releases
Search
  • News
    • Technology News
    • Business News
    • Local News
    • News Stories
    • General News
    • World News
    • Global News
  • Media Releases
    • Tech Media Releases
    • General Press
  • Categories
    • Crypto News
    • Cyber
    • Digital Marketing
    • Education
    • Gadgets
    • Technology
    • Guest Publishers
    • IT Security
    • People In Technology
    • Reports
    • Science
    • Software
    • Stock Market
  • Promoted Content
    • Advertisers
    • Promoted
    • Sponsored Whitepapers
  • Contact & About
    • Contact Information
    • About Tech Business News
    • News Contributions & Submissions
Follow US
© 2022 Tech Business News- Australian Technology News. All Rights Reserved.
Tech Business News > IT Security > Your Backups Might Be Your Greatest Weakness
IT Security

Your Backups Might Be Your Greatest Weakness

Editorial Desk
Last updated: November 30, 2022 6:50 am
Editorial Desk
Share
SHARE

Configuration files are a great resource for maintaining a website with ease, but they are also a common resource for malicious actors.

Contents
Configuration Backup ProbingHere are the top ten IP addresses wordfence have blocked from probing for wp-config.php backups.Common Backup MistakesExtended Summary

Developers and website operators benefit from configuration files by avoiding the need to hard code or manually enter connection details, which would otherwise be required in a world without configuration files.

It would be cumbersome to find exactly where configuration details are kept, and to update all instances of reusable data. There would also be code bloat and possible performance issues. Even just changing a website would be a difficult task.

Configuration Backup Probing

Wordfence has detected 70,408,576 attempts to locate wp-config.php file backups in the last 30 days. This is so common that Wordfence’s firewall detected it.

For instance, the search phrase inurl:wp-config.php intext:DB_PASSWORD will return results for files containing wp-config.php within the URL that also contain DB_PASSWORD in the body of the file that loads.

Malicious actors often use scripts and prebuilt tools to automate the process of finding backup configuration files. Using some form of automation to find these files makes the process much more efficient.

 Probe Attemps  - WordFence
Image – Probe Attemps – WordFence

Wordfence found four legitimate uptime scanners that were detecting this file in this data. The issue with these scanners is that they are inexpensive and two of them offer free versions.

There is no justifiable reason to scan for wp-config.php backups, so malicious actors have concluded that the resources required to use these scanners are outweighed by the advantages of using a recognised legitimate solution for nefarious purposes.

A little over 6.5 million wp-config.php file backups are located using these scanners.

Here are the top ten IP addresses wordfence have blocked from probing for wp-config.php backups.

  • 3.69.53.252 with 3953193 attempts
  • 3.71.111.191 with 2165519 attempts
  • 52.59.9.15 with 1726745 attempts
  • 35.83.251.89 with 1707670 attempts
  • 3.96.219.221 with 1645568 attempts
  • 35.182.107.115 with 1553854 attempts
  • 34.240.248.60 with 1526032 attempts
  • 50.16.69.90 with 1065868 attempts
  • 3.99.130.127 with 952639 attempts
  • 35.91.211.91 with 789722 attempts

All of these servers are registered to Amazon and located throughout the world.

 Probe Atttepts Logged - WordFence
Image – Probe Atttepts Logged – WordFence

It’s common for threat actors to use servers in any location that could be useful to them, especially if there is a location that is known for allowing (or at least turning a blind eye to) the type of activity they will be using the server for.

Common Backup Mistakes

Making a backup of the wp-config.php file by making a copy and appending a new file extension like .txt, .bak, or .html is a common method. It’s a fast way to back up the file, and it can be restored by changing the filename back to its original.

The issue is that these files are available on the web, making it relatively easy for malicious actors to locate the sensitive information.

Extended Summary

Looking at the data gathered over the last 30 days, it is obvious that searching for configuration files such as wp-config.php is common among malicious actors. The database credentials alone can be very important to anyone wishing to seize a website.

Someone looking to take over a website might find wp-config.php files even more valuable than before, as over 40% of websites currently run WordPress (Barnes, 2018). This CMS only requires knowledge of one CMS to find wp-config.php files (Barnes, 2018).

The Wordfence Scanner includes an option to “Scan for publicly accessible configuration, backup, or log files”, which will notify you if any publicly accessible configuration, backup, or log files are present in your site’s directory.

For regular scans, this option is turned on, and you may check it for custom scans as well. If you discovered that you have a sensitive file that is publicly accessible, Wordfence strongly advise removing it immediately.

ByEditorial Desk
The TBN team is a well establish group of technology industry professionals with backgrounds in IT Systems, Business Communications and Journalism.
Previous Article Devo Technology Strategic Collaboration AWS Devo Technology Announce Multi Year Strategic Collaboration With Amazon Web Services (AWS)
Next Article New quantum computing feat 150 year-old experiment UNSW Sydney Research Demonstrates 20x Improvement In Resetting a Quantum Bit to Its ‘0’ State
Configuration Probing backup weakness

Tech Articles

How the World’s Data Centres Are Quietly Burning the Planet

Data centres are burning the planet, with a growing environmental…

March 11, 2026
How Telstra Held Back Australia’s Internet Speed — And What It Means for Users

How Telstra Held Back Australia’s Internet Speed — And What It Means for Users

How Telstra Held Back Australia’s Internet Speed — And What…

January 21, 2026
Email Authentication Hacking SPF, DKIM, and DMARC business security

Email Authentication: The Security Triple-Lock Your Business Can’t Afford To Ignore

Email authentication relies on SPF, DKIM and DMARC to verify…

January 11, 2026

Recent News

Backdoor ESET named Dolphin ScarCruft APT group
IT Security

North Korea-linked group launches Dolphin backdoor, steals files and communicates via Google Drive

4 Min Read
Wordfence Download Manager Patched
IT Security

High Severity Vulnerability Patched in WordPress Download Manager Plugin

6 Min Read
Mitigating Threats To Cloud-Based GPUs
IT Security

Mitigating Threats To Cloud-Based GPUs

7 Min Read
Cisco RV router patch
IT Security

Cisco urges customers to patch vulnerabilities discovered in its RV series routers.

3 Min Read
Tech News

Tech Business News

In 2026, technology news is shaping business outcomes faster than ever—driven by AI adoption, rising cyber risk, cloud modernisation, data regulation, and constant platform change.


Tech News keeps Australian organisations and industry professionals informed with timely reporting and practical coverage across AI, cybersecurity, cloud, enterprise IT, startups, science, people and business, plus major world and local news impacting the tech sector.


Tech Business News publishes news and analysis designed to be clear, relevant, and easy to act on. It supports the industry with technology news reports, whitepaper publishing services, and a range of media, advertising and publishing options 

About

About Us 
Contact Us 
Privacy Policy
Copyright Policy
Terms & Conditions

April, 05, 2026

Contact

Tech Business News
Melbourne, Australia
Werribee 3030
Phone: +61 431401041

Hours : Monday to Friday, 9am 530-pm.

Tech News

© Copyright Tech Business News 

Latest Australian Tech News – 2026

Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?